SIP security:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Chichester, U.K.
Wiley
2009
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | Includes bibliographical references (pages 317-329) and index This book gives a detailed overview of SIP specific security issues and how to solve them. While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not |
Beschreibung: | 1 Online-Ressource (xiv, 336 pages) |
ISBN: | 9780470516997 0470516992 9780470516980 0470516984 0470516364 9780470516362 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043389794 | ||
003 | DE-604 | ||
005 | 20200511 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780470516997 |9 978-0-470-51699-7 | ||
020 | |a 0470516992 |9 0-470-51699-2 | ||
020 | |a 9780470516980 |c electronic bk. |9 978-0-470-51698-0 | ||
020 | |a 0470516984 |c electronic bk. |9 0-470-51698-4 | ||
020 | |a 0470516364 |9 0-470-51636-4 | ||
020 | |a 9780470516362 |9 978-0-470-51636-2 | ||
024 | 7 | |a 10.1002/9780470516997 |2 doi | |
035 | |a (ZDB-35-WIC)ocn352829720 | ||
035 | |a (OCoLC)352829720 | ||
035 | |a (DE-599)BVBBV043389794 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a SIP security |c Dorgham Sisalem [and others] |
246 | 1 | 3 | |a Sesssion Initiation Protocol security |
264 | 1 | |a Chichester, U.K. |b Wiley |c 2009 | |
300 | |a 1 Online-Ressource (xiv, 336 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 317-329) and index | ||
500 | |a This book gives a detailed overview of SIP specific security issues and how to solve them. While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not | ||
650 | 4 | |a Computer networks | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Session Initiation Protocol (Computer network protocol) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Sisalem, Dorgham |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-470-51636-2 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-WEL | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028808378 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175963266744320 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043389794 |
classification_rvk | ST 277 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)ocn352829720 (OCoLC)352829720 (DE-599)BVBBV043389794 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03102nmm a2200613zc 4500</leader><controlfield tag="001">BV043389794</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200511 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470516997</subfield><subfield code="9">978-0-470-51699-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470516992</subfield><subfield code="9">0-470-51699-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470516980</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-51698-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470516984</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-51698-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470516364</subfield><subfield code="9">0-470-51636-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470516362</subfield><subfield code="9">978-0-470-51636-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9780470516997</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn352829720</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)352829720</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043389794</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SIP security</subfield><subfield code="c">Dorgham Sisalem [and others]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Sesssion Initiation Protocol security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, U.K.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 336 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 317-329) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book gives a detailed overview of SIP specific security issues and how to solve them. While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Session Initiation Protocol (Computer network protocol)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sisalem, Dorgham</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-470-51636-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028808378</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043389794 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:38Z |
institution | BVB |
isbn | 9780470516997 0470516992 9780470516980 0470516984 0470516364 9780470516362 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028808378 |
oclc_num | 352829720 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (xiv, 336 pages) |
psigel | ZDB-35-WIC ZDB-35-WEL UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | SIP security Dorgham Sisalem [and others] Sesssion Initiation Protocol security Chichester, U.K. Wiley 2009 1 Online-Ressource (xiv, 336 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 317-329) and index This book gives a detailed overview of SIP specific security issues and how to solve them. While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not Computer networks COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Sisalem, Dorgham Sonstige oth Erscheint auch als Druck-Ausgabe, Hardcover 978-0-470-51636-2 https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | SIP security Computer networks COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | SIP security |
title_alt | Sesssion Initiation Protocol security |
title_auth | SIP security |
title_exact_search | SIP security |
title_full | SIP security Dorgham Sisalem [and others] |
title_fullStr | SIP security Dorgham Sisalem [and others] |
title_full_unstemmed | SIP security Dorgham Sisalem [and others] |
title_short | SIP security |
title_sort | sip security |
topic | Computer networks COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit Rechnernetz |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9780470516997 |
work_keys_str_mv | AT sisalemdorgham sipsecurity AT sisalemdorgham sesssioninitiationprotocolsecurity |